Skip to main content
Erschienen in: Wireless Personal Communications 1/2020

05.11.2019

Hybrid RSAECC Based Secure Communication in Mobile Cloud Environment

verfasst von: S. Sridhar, S Smys

Erschienen in: Wireless Personal Communications | Ausgabe 1/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Mobile computing gained much attention in current research arena due to the enhancement of services such as mobile learning, health care monitoring and e commerce. The experience and satisfaction which increases the user count in millions on every day. Advantage of using cloud computing for essential multipath communication creates path for multi homing architecture and multi path data transmission. While the technology develops the security breaches are also increases due to the increased number of users and loads. System has to be considered as stable and safe only if breaches are reduced. Based on the applications services has to be enhanced with reliability, less faults, and robustness makes end to end communication much better for the future. The proposed research work describes a secure cloud computing mobile environment which provides meritorious service to the users. Experimental results highlights the proposed model has 98.5% of success ratio on providing secure communication services to the users via cloud computing applications.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Win, T. Y., Tianfield, H., & Mair, Q. (2018). Big data based security analytics for protecting virtualized infrastructures in cloud computing. IEEE Transactions on Big Data,4(1), 11–25.CrossRef Win, T. Y., Tianfield, H., & Mair, Q. (2018). Big data based security analytics for protecting virtualized infrastructures in cloud computing. IEEE Transactions on Big Data,4(1), 11–25.CrossRef
2.
Zurück zum Zitat Chen, J., & Zhu, Q. (2017). Security as a service for cloud-enabled internet of controlled things under advanced persistent threats: A contract design approach. IEEE Transactions on Information Forensics and Security,12(11), 2736–2750.CrossRef Chen, J., & Zhu, Q. (2017). Security as a service for cloud-enabled internet of controlled things under advanced persistent threats: A contract design approach. IEEE Transactions on Information Forensics and Security,12(11), 2736–2750.CrossRef
3.
Zurück zum Zitat Meng, Y., Qin, T., Liu, Y., & He, C. (2018). An effective high threating alarm mining method for cloud security management. IEEE Access,6(1), 22634–22644.CrossRef Meng, Y., Qin, T., Liu, Y., & He, C. (2018). An effective high threating alarm mining method for cloud security management. IEEE Access,6(1), 22634–22644.CrossRef
4.
Zurück zum Zitat Shirazi, S. N., Gouglidis, A., Farshad, A., & Hutchison, D. (2017). The extended cloud: Review and analysis of mobile edge computing and fog from a security and resilience perspective. IEEE Journal on Selected Areas in Communications,35(11), 2586–2595.CrossRef Shirazi, S. N., Gouglidis, A., Farshad, A., & Hutchison, D. (2017). The extended cloud: Review and analysis of mobile edge computing and fog from a security and resilience perspective. IEEE Journal on Selected Areas in Communications,35(11), 2586–2595.CrossRef
5.
Zurück zum Zitat Gope, P., & Das, A. K. (2017). Robust anonymous mutual authentication scheme for n-times ubiquitous mobile cloud computing services. IEEE Internet of Things Journal,4(5), 1764–1772.CrossRef Gope, P., & Das, A. K. (2017). Robust anonymous mutual authentication scheme for n-times ubiquitous mobile cloud computing services. IEEE Internet of Things Journal,4(5), 1764–1772.CrossRef
6.
Zurück zum Zitat Li, R., Shen, C., He, H., Gu, X., Xu, Z., & Xu, C.-Z. (2018). A lightweight secure data sharing scheme for mobile cloud computing. IEEE Transactions on Cloud Computing,6(2), 344–357.CrossRef Li, R., Shen, C., He, H., Gu, X., Xu, Z., & Xu, C.-Z. (2018). A lightweight secure data sharing scheme for mobile cloud computing. IEEE Transactions on Cloud Computing,6(2), 344–357.CrossRef
7.
Zurück zum Zitat Sajid, A., Abbas, H., & Saleem, K. (2016). Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges. IEEE Access,4(1), 1375–1384.CrossRef Sajid, A., Abbas, H., & Saleem, K. (2016). Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges. IEEE Access,4(1), 1375–1384.CrossRef
8.
Zurück zum Zitat Wei, H., Hu, G.-Y., Han, X., Qiao, P., Zhou, Z., Feng, Z.-C., et al. (2018). A new BRB model for cloud security-state prediction based on the large-scale monitoring data. IEEE Access,6(1), 11907–11920.CrossRef Wei, H., Hu, G.-Y., Han, X., Qiao, P., Zhou, Z., Feng, Z.-C., et al. (2018). A new BRB model for cloud security-state prediction based on the large-scale monitoring data. IEEE Access,6(1), 11907–11920.CrossRef
9.
Zurück zum Zitat Ali, M., Bilal, K., Khan, S. U., Veeravalli, B., Li, K., & Zomaya, A. Y. (2018). DROPS: Division and replication of data in cloud for optimal performance and security. IEEE Transactions on Cloud Computing,6(2), 303–315.CrossRef Ali, M., Bilal, K., Khan, S. U., Veeravalli, B., Li, K., & Zomaya, A. Y. (2018). DROPS: Division and replication of data in cloud for optimal performance and security. IEEE Transactions on Cloud Computing,6(2), 303–315.CrossRef
10.
Zurück zum Zitat de Santana, N. A., Lins, F. A. A., & de Sousa, E. T. G. (2016). Performance evaluation of mobile applications in mobile cloud environments. IEEE Latin America Transactions,14(11), 4597–4602.CrossRef de Santana, N. A., Lins, F. A. A., & de Sousa, E. T. G. (2016). Performance evaluation of mobile applications in mobile cloud environments. IEEE Latin America Transactions,14(11), 4597–4602.CrossRef
11.
Zurück zum Zitat Gope, P., & Das, A. K. (2017). Robust anonymous mutual authentication scheme for n-times ubiquitous mobile cloud computing services. IEEE Internet of Things Journal,4(5), 1764–1772.CrossRef Gope, P., & Das, A. K. (2017). Robust anonymous mutual authentication scheme for n-times ubiquitous mobile cloud computing services. IEEE Internet of Things Journal,4(5), 1764–1772.CrossRef
12.
Zurück zum Zitat Kumar, N., Iqbal, R., Misra, S., Rodrigues, J. J. P. C., & Obaidat, M. S. (2018). Bayesian cooperative coalition game as a service for RFID-based secure QoS management in mobile cloud. IEEE Transactions on Emerging Topics in Computing,6(1), 58–71.CrossRef Kumar, N., Iqbal, R., Misra, S., Rodrigues, J. J. P. C., & Obaidat, M. S. (2018). Bayesian cooperative coalition game as a service for RFID-based secure QoS management in mobile cloud. IEEE Transactions on Emerging Topics in Computing,6(1), 58–71.CrossRef
13.
Zurück zum Zitat Li, H., Liu, D., Dai, Y., Luan, T. H., & Yu, S. (2018). Personalized search over encrypted data with efficient and secure updates in mobile clouds. IEEE Transactions on Emerging Topics in Computing,6(1), 97–109.CrossRef Li, H., Liu, D., Dai, Y., Luan, T. H., & Yu, S. (2018). Personalized search over encrypted data with efficient and secure updates in mobile clouds. IEEE Transactions on Emerging Topics in Computing,6(1), 97–109.CrossRef
14.
Zurück zum Zitat Li, J., Huang, L., Zhou, Y., He, S., & Ming, Z. (2018). Computation partitioning for mobile cloud computing in a big data environment. IEEE Transactions on Industrial Informatics,13(4), 2009–2018.CrossRef Li, J., Huang, L., Zhou, Y., He, S., & Ming, Z. (2018). Computation partitioning for mobile cloud computing in a big data environment. IEEE Transactions on Industrial Informatics,13(4), 2009–2018.CrossRef
15.
Zurück zum Zitat Shabir, M. Y., Iqbal, A., Mahmood, Z., & Ghafoor, A. (2016). Analysis of classical encryption techniques in cloud computing. Tsinghua Science and Technology,21(1), 102–113.CrossRef Shabir, M. Y., Iqbal, A., Mahmood, Z., & Ghafoor, A. (2016). Analysis of classical encryption techniques in cloud computing. Tsinghua Science and Technology,21(1), 102–113.CrossRef
16.
Zurück zum Zitat Xi, K., Tang, Y., & Hu, J. (2011). Correlation keystroke verification scheme for user access control in cloud computing environment. The Computer Journal,54(10), 1632–1644.CrossRef Xi, K., Tang, Y., & Hu, J. (2011). Correlation keystroke verification scheme for user access control in cloud computing environment. The Computer Journal,54(10), 1632–1644.CrossRef
17.
Zurück zum Zitat Chillotti, I., Gama, N., Georgieva, M., Izabachne, M. (2016). Faster fully homomorphic encryption: bootstrapping in less than 0.1 seconds. In ASIACRYPT 2016 (vol. 10031, pp. 3–33). LNCS, Springer. Chillotti, I., Gama, N., Georgieva, M., Izabachne, M. (2016). Faster fully homomorphic encryption: bootstrapping in less than 0.1 seconds. In ASIACRYPT 2016 (vol. 10031, pp. 3–33). LNCS, Springer.
18.
Zurück zum Zitat Jiang, Q., Ma, J., & Wei, F. (2018). On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Systems Journal,12(2), 2039–2042.CrossRef Jiang, Q., Ma, J., & Wei, F. (2018). On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Systems Journal,12(2), 2039–2042.CrossRef
19.
Zurück zum Zitat Kulshreshtha, V., Verma, S., Rama, C., & Challa, K. (2014). A comprehensive evaluation of cryptographic algorithms in cloud computing. IEEE Institute of Electrical and Electronics Engineers,1, 1. Kulshreshtha, V., Verma, S., Rama, C., & Challa, K. (2014). A comprehensive evaluation of cryptographic algorithms in cloud computing. IEEE Institute of Electrical and Electronics Engineers,1, 1.
20.
Zurück zum Zitat El Makkaoui, K., Ezzati, A., & Cloud-RSA, Beni-Hssane A. (2017). An enhanced homomorphic encryption scheme. Europe and MENA cooperation advances in information and communication technologies (Vol. 1, pp. 471–480). Berlin: Springer.CrossRef El Makkaoui, K., Ezzati, A., & Cloud-RSA, Beni-Hssane A. (2017). An enhanced homomorphic encryption scheme. Europe and MENA cooperation advances in information and communication technologies (Vol. 1, pp. 471–480). Berlin: Springer.CrossRef
Metadaten
Titel
Hybrid RSAECC Based Secure Communication in Mobile Cloud Environment
verfasst von
S. Sridhar
S Smys
Publikationsdatum
05.11.2019
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2020
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06867-0

Weitere Artikel der Ausgabe 1/2020

Wireless Personal Communications 1/2020 Zur Ausgabe

Neuer Inhalt